Home // ICDS 2013, The Seventh International Conference on Digital Society // View article


Security Assurance Requirements for Hypervisor Deployment Features

Authors:
Ramaswamy Chandramouli

Keywords: Virtual Machine; Virtual Network; Hypervisor; Virtualized Host; Security Assurance Requirements

Abstract:
Virtualized hosts provide abstraction of the hardware resources (i.e., CPU, Memory, etc.) enabling multiple computing stacks to be run on a single physical machine. The Hypervisor is the core software that enables this virtualization and hence must be configured to ensure security robustness for the entire virtualization infrastructure. Among the various combination of hypervisor types and hypervisor hardware platforms, we have chosen a reference architecture as the basis for our set of deployment features. For each deployment feature, this paper looks at the configuration options and analyzes the security implications of the options/deployment feature to derive a set of assurance requirements that are either (a) provided by each of the configuration options; or (b) required for that deployment feature as a whole regardless of configuration options.

Pages: 120 to 125

Copyright: Copyright (c) The Government of USA, 2013. Used by permission to IARIA.

Publication date: February 24, 2013

Published in: conference

ISSN: 2308-3956

ISBN: 978-1-61208-249-3

Location: Nice, France

Dates: from February 24, 2013 to March 1, 2013